Tips to select Final Year Projects

Do not Prefer Application Projects. If you want to do then You can get it from Internet . There won’t be any major scope for the Application projects and there won’t be any waitage to the project in the Interview.

Most of the project centers will rename the topic for a particular topic. Get the base paper and verify with our blog to check the genuinity of the project. Identify the best place to do your projects.


Wireless computing domain : cse/it students are not advised to do projects in wiress computing domain. 100% of the projects done in this domain is fake. Base Paper should not contain wireless, protocols, packets. Obviously, wireless computing domain projects without proper sensors and wireless network formation cannot be done. So students should not prefer wireless domain. Simulation project in wireless costs rs. 250 in the market and it’s of no use.

Question to ask: What’s the sensor we are using? What’s the range of wireless communication happening? How we are connecting to the node. Where the nodes are located. If the nodes are located in the same machine or different machine. Throw away the project.


networking project - A real networking project should have real routers. Instead, if we use pictures as routers then it can’t be a real project and there is no scope for the project. simulation project costs only Rs. 200 in tamil nadu.

Question to ask: what kind of router / switch we are going to use? what kind of programming we are going to do in the router. if there is no router, don’t take up this project.

Wifi Projects are not networking projects. This kind of projects cost Rs.200


grid computing domain : absolutely fake project domain. it’s impossible to construct or design grid in the real world. all final year projects in this domain are fake. Implementing a real grid is not possible for a student. simulating grid related projects cost 400 to 500 rs.

Question to ask: what’s the grid we are going to use? is it oracle grid environment or sql azure environment. project related to this domain is fake. no questions to ask.


Cloud Computing domain – Connecting to the external world Atleast next country is cloud computing. If connected to the remote machine or same machine is a simulation project. Any simulation project under this domain costs 200 rs.

Question to ask: where we are connecting to fetch data? if it’s next machine or same machine then it’s networking project not a cloud computing project. The data should be in remote atleast in other country.


Mobile with wireless domain: all the project in this domain is fake. simulation projects costs 270 rs.

Question to ask: no questions to ask. don’t prefer this domain.


Data mining domain – real data mining involves knowledge cube construction and it’s done by the tools ssas and owb. implementing this project only with java or dotnet is fake. constructino a OLAP environment and using mdx queries to fetch data is the real data mining project. simulation project costs 320 rs.

Question to ask: how we are constructing the cube? how we are fetching the data. project with out cube is absolutely fake.


web mining – collating the real data from internet directly. Data processed in database is absolutely fake. simulation project costs 250 rs.

Question to ask: how dynamically we are retrieving the data from internet? how it’s processed based on the base paper.


REAL TIME SURVEILLANCE SECURITY – REAL CAMERA SHOULD BE USED. using web camera is a FAKE PROJECTS. do not do this kind of project. there won’t be any value for this project.
students are not advised to do projects related to videos. the entire source code is available in internet and there is no scope for these projects.

Question to ask: waste domain. don’t prefer.


NETWORKS domain – ROUTER AND SWITCH IS COMPULSORY for a networking project. PICTURS OF rOUTER/NODES/SWITCH/ SERVER IS absolutely FAKE. simulation project doesn't have value and it costs 300-400 rs.

Question to ask: what kind of router / switch we are going to use? what kind of programming we are going to do in the router. if there is no router, don’t take up the project.


SERVER PERFORMANCE – PROJECT SHOULD BE DONE IN THE REAL SERVER LIKE MACHINE with windows server or web sphere or linux os. the server configuration should be minimal OF QUAD CORE WITH SERVER OPERATING SYSTEM(Windows server or websphere) OR ELSE IT’S FAKE. no value for the simulation projects.

Question to ask: getting the server or configuring the server is too costly. how the performance will be calculated. if it’s local machine, then its waste project.


NEURAL NETWORKS - DO NOT PREFER this domain. it’s OUTDATED DOMAIN

Question to ask: nothing to say. no value for this project.


ARTIFICIAL INTELLIGENCE – real ai cANNot BE implemented by final year project centers due to hardware requirements too. REMODIFICATION OF SMALL PIECE OF CODE IN INTERNET CAN BE DONE. REAL ieee PAPERS CANNOT BE IMPLEMENTED. dO NOT PREFER THIS KIND OF PROJECT for completing your final year projects.

Question to ask: don’t prefer this domain.

Thursday 18 October 2012

Fake Final Year Projects for the year 2012

 Am Listing down the Fake Final Year Projects for the year 2012 : These projects cost Rs. 100 to Rs. 300 in the market

Check the project base paper with our blog. I couldn't list down the entire 2012 projects. I am listing 50% of the project list in this blog. Be careful while selecting your final year projects. Most of the centers will rename the projects and sell the same to the students. Check the base papers topic with our blog.


  -------------------------------------------------------------------
A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
  -------------------------------------------------------------------
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing

 -------------------------------------------------------------------

Resilient Authenticated Execution of CriticalApplications in Untrusted Environments

 -------------------------------------------------------------------

Automatic Reconfiguration for Large-Scale Reliable Storage Systems

 -------------------------------------------------------------------

 Data-Provenance Verification For Secure Hostt

 -------------------------------------------------------------------

 Distributed Resource Allocation Based on Queue Balancing in Multihop Cognitive Radio Networks

 -------------------------------------------------------------------

BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks

 -------------------------------------------------------------------

Enhancing Privacy and Accuracy in Probe Vehicle-Based Traffic Monitoring via Virtual Trip Lines



 -------------------------------------------------------------------

Saturn: Range Queries, Load Balancing and Fault Tolerance in DHT Data Systems

 -------------------------------------------------------------------


Scene-Oriented Hierarchical Classification of Blurry and Noisy Images

 -------------------------------------------------------------------

 

QoS Assurance for Dynamic Reconfiguration ofComponent-Based Software Systems

 -------------------------------------------------------------------

StakeRare: Using Social Networks and CollaborativeFiltering for Large-Scale Requirements Elicitation

 -------------------------------------------------------------------

A Statistical Mechanics-Based Framework to Analyze Ad Hoc Networks with Random Access
-------------------------------------------------------------------
TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks
-------------------------------------------------------------------
Capacity Scaling of Wireless Ad Hoc Networks: Shannon Meets Maxwell
-------------------------------------------------------------------
CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks
-------------------------------------------------------------------
Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
-------------------------------------------------------------------
Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network
-------------------------------------------------------------------
Maximal Scheduling in Wireless Ad Hoc Networks with Hyper graph Interference Models
-------------------------------------------------------------------
Throughput and Energy Efficiency in Wireless Ad Hoc Networks with Gaussian Channels
-------------------------------------------------------------------
Routing Architecture for Vehicular Ad-Hoc Networks
-------------------------------------------------------------------
Evaluating Trust in Ad Hoc Network Routing by Induction of Decision Trees
-------------------------------------------------------------------
Consensus in Sparse, Mobile Ad Hoc Networks
-------------------------------------------------------------------
Connectivity of Multiple Cooperative Cognitive Radio Ad Hoc Networks
-------------------------------------------------------------------
Discovering Characterizations of the Behavior of Anomalous Sub-populations
-------------------------------------------------------------------
Outsourced Similarity Search on Metric Data Assets
-------------------------------------------------------------------
Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
-------------------------------------------------------------------
Scalable Learning of Collective Behavior
-------------------------------------------------------------------
Slicing: A New Approach to Privacy Preserving
Data Publishing
-------------------------------------------------------------------
Efficient Extended Boolean Retrieval
-------------------------------------------------------------------
Ranking Model Adaptation for Domain-Specific Search
-------------------------------------------------------------------
Data Mining Techniques for Software Effort Estimation: A Comparative Study
-------------------------------------------------------------------
Data-mining experiments on a hydroelectric power plant
Fuzzy Modeling Built Through a Data Mining Process
-------------------------------------------------------------------
GA Guided Cluster Based Fuzzy Decision Tree for Reactive Ion Etching Modeling: A Data Mining Approach
-------------------------------------------------------------------
A Data-Mining Approach to Monitoring Wind Turbines
-------------------------------------------------------------------
A Low-Power Integrated x86–64 and Graphics Processor for Mobile Computing Devices
-------------------------------------------------------------------
Improving QoS in High-Speed Mobility Using Bandwidth Maps
-------------------------------------------------------------------
SenseLess: A Database-Driven White Spaces Network
-------------------------------------------------------------------
A Proxy-Based Architecture for Dynamic Discovery and Invocation of Web Services from Mobile Devices
-------------------------------------------------------------------
Building Security into Off-the-Shelf Smartphones
From Context Awareness to Socially Aware Computing
-------------------------------------------------------------------
Location-Based Services on Mobile Phones: Minimizing Power Consumption
-------------------------------------------------------------------
Ubicomp Systems at 20: Progress, Opportunities, and Challenges
-------------------------------------------------------------------
Logical Data models for cloud computing architectures
-------------------------------------------------------------------
Moving 2 Mishap: M2M’s Impact on Privacy and Safety
-------------------------------------------------------------------
Imagining the Future: Thoughts on Computing
-------------------------------------------------------------------
Improving the Automation of Security Information Management: A Collaborative Approach
-------------------------------------------------------------------
Issues and Future Directions in Traffic Classification
-------------------------------------------------------------------
Moving 2 Mishap: M2M’s Impact on Privacy and Safety
Packet-Hiding Methods for Preventing Selective Jamming Attacks Power. Law.
-------------------------------------------------------------------
Security Challenges for the Public Cloud
-------------------------------------------------------------------
Silver Bullet Talks with Deborah Frincke
-------------------------------------------------------------------
Systematic Structural Testing of Firewall Policies
-------------------------------------------------------------------
Logical Data models for cloud computing architectures
-------------------------------------------------------------------
Radar Image Processing with Clusters of Computers.
-------------------------------------------------------------------
Reducing DRAM Image Data Access Energy Consumption in Video Processing.
-------------------------------------------------------------------
Run length-Based Processing Methods for Low Bit-depth Images.
-------------------------------------------------------------------
Select Trends in Image, Video, and Multidimensional Signal Processing.
-------------------------------------------------------------------
Shape-Based Hand Recognition.
-------------------------------------------------------------------
The Past, Present, and Future of Image and Multidimensional Signal Processing.
-------------------------------------------------------------------
Toward a Unified Color Space for Perception-Based Image Processing.
-------------------------------------------------------------------
Video Image Processing with the Sonic Architecture.
-------------------------------------------------------------------
ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing
-------------------------------------------------------------------
Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks
Catching Packet Droppers and Modifiers in Wireless Sensor Networks
-------------------------------------------------------------------
Bounding the Impact of Unbounded Attacks in Stabilization
Cut Detection in Wireless Sensor Networks
-------------------------------------------------------------------
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
-------------------------------------------------------------------
Capacity of Data Collection in Arbitrary Wireless Sensor Networks
-------------------------------------------------------------------
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
-------------------------------------------------------------------
Scalable Learning of Collective Behavior
-------------------------------------------------------------------
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
-------------------------------------------------------------------
Cooperative Density Estimation in Random Wireless Ad Hoc Networks -------------------------------------------------------------------
Distributed Private Key Generation for Identity Based Cryptosystems in Ad Hoc Networks -------------------------------------------------------------------
DSDMAC: Dual Sensing Directional MAC Protocol for Ad Hoc Networks with Directional Antennas -------------------------------------------------------------------
Automatic Error Analysis Using Intervals.
-------------------------------------------------------------------
Focus on Your Job Search IEEE.
-------------------------------------------------------------------
CAP and Cloud Data Management 
.-------------------------------------------------------------------
Clouds Meet Agents toward intelligent cloud services
Digging Into Data.
-------------------------------------------------------------------
Environmental Modeling for Automated Cloud Application Testing.
-------------------------------------------------------------------
Logical Data Models For Cloud Computing Architectures.
-------------------------------------------------------------------
Payments For Outsourced Computations.
-------------------------------------------------------------------
Rise And Fall of the Peer-To-Peer Empire.
-------------------------------------------------------------------
Security Challenges For the Public Cloud.
-------------------------------------------------------------------
The Future of Authentication.   - No proper base paper and Waste project. It doesn't have even 100Rs. worth.
-------------------------------------------------------------------
Cloud Computing Security From Single to Multi-Clouds
-------------------------------------------------------------------
A Mining Technique Using n-Grams and Motion Transcripts for Body Sensor Network Data Repository
-------------------------------------------------------------------
Bridging Social and Data Networks
-------------------------------------------------------------------
Routing in pocket switched networks
-------------------------------------------------------------------
Guest Editorial Introduction to the Special Section: 4G Health—The Long-Term Evolution of m-Health
-------------------------------------------------------------------
Smooth Trade-Offs between Throughput and Delay in Mobile Ad Hoc Networks
-------------------------------------------------------------------
FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks
-------------------------------------------------------------------
Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network
-------------------------------------------------------------------
Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols
-------------------------------------------------------------------
A Trigger Identification Service for Defending Reactive Jammers in WSN
-------------------------------------------------------------------
Cloud Data Protection for the Masses
-------------------------------------------------------------------
Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
-------------------------------------------------------------------
Payments for Outsourced Computations
-------------------------------------------------------------------
Efficient Server Provisioning with Control for End-to-End Response Time Guarantee on Multitier Clusters
-------------------------------------------------------------------
Autonomic Placement of Mixed Batch and Transactional Workloads
-------------------------------------------------------------------
Efficient Master/Worker Parallel Discrete Event Simulation on Meta computing Systems
-------------------------------------------------------------------
Comparison-Based System- Level Fault Diagnosis: A Neural Network Approach
-------------------------------------------------------------------
A Symmetric Load Balancing Algorithm with Performance Guarantees for Distributed Hash Tables
-------------------------------------------------------------------
An Online Data Access Prediction and Optimization Approach for Distributed System
-------------------------------------------------------------------



Exploring Peer-to-Peer Locality in Multiple Torrent Environment
-------------------------------------------------------------------
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
-------------------------------------------------------------------
Scalable Real-Time Monitoring Distributed Applications
-------------------------------------------------------------------
A Distributed Control Law for Load Balancing in Content Delivery Networks
-------------------------------------------------------------------
On Optimizing Overlay Unstructured Peer-to-Peer Networks
-------------------------------------------------------------------
Scalable Feedback Aggregating (SFA) Overlay for Large-scale P2P Trust Management
-------------------------------------------------------------------
Load Balance with Imperfect Information in Structured Peer-to-Peer Systems
-------------------------------------------------------------------
On the Robustness of BitTorrent Swarms to Greedy Peers
-------------------------------------------------------------------
Effective Delay-Controlled Load Distribution over Multipath Networks
-------------------------------------------------------------------
Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
-------------------------------------------------------------------
Node Reclamation and Replacement for Long-lived Sensor Networks
-------------------------------------------------------------------
Energy Efficient Opportunistic Routing in Wireless Sensor Networks
-------------------------------------------------------------------
Efficient Fuzzy Type-Ahead Search in XML Data
-------------------------------------------------------------------
Creating Evolving User Behavior Profiles Automatically
-------------------------------------------------------------------
Incentive Compatible Privacy- Preserving Data Analysis
-------------------------------------------------------------------
Evaluating Path Queries over Frequently Updated Route collections.
-------------------------------------------------------------------
A User-friendly Patent Search Paradigm
-------------------------------------------------------------------
A Context based Word Indexing Model for Document Summarization
-------------------------------------------------------------------
Document Clustering in Correlation Similarity Measure Space
-------------------------------------------------------------------
Scalable Learning of Collective Behavior
-------------------------------------------------------------------
Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
-------------------------------------------------------------------
Improving Aggregate Recommendation Diversity using Ranking Based Techniques
-------------------------------------------------------------------
Falcons Concept Search: A Practical Search Engine for Web Ontologies
-------------------------------------------------------------------
Privacy-Preserving Updates to Anonymous and Confidential Databases
-------------------------------------------------------------------
Intertemporal Discount Factors as a Measure of Trustworthiness in Electronic Commerce
-------------------------------------------------------------------
On the Security and Efficiency of Content Distribution via Network Coding
-------------------------------------------------------------------
Risk-Aware Mitigation for MANET Routing Attacks
-------------------------------------------------------------------
Detecting Anomalous Insiders in Collaborative Information Systems
-------------------------------------------------------------------
Remote Attestation with Domain-Based Integrity Model and Policy Analysis
-------------------------------------------------------------------
Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals
-------------------------------------------------------------------
Secure Failure Detection and Consensus in Trusted Pals
-------------------------------------------------------------------
Catching Packet Droppers and Modifiers in Wireless Sensor Networks
-------------------------------------------------------------------
Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
-------------------------------------------------------------------
A Hybrid Algorithm of Backward Hashing and Automaton Tracking for Virus Scanning
-------------------------------------------------------------------
Modeling and Detection of Camouflaging Worm
-------------------------------------------------------------------
Towards Situational Awareness of Large-Scale Botnet Probing Events
-------------------------------------------------------------------
A Gossip Protocol for Dynamic Resource Management in Large Cloud Environments
-------------------------------------------------------------------
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
-------------------------------------------------------------------
THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
-------------------------------------------------------------------
Toward Secure and Dependable Storage Services in Cloud Computing
-------------------------------------------------------------------
Multicloud Deployment of Computing Clusters for Loosely Coupled MTC Applications
-------------------------------------------------------------------
Collaborative Writing Support Tools on the Cloud
-------------------------------------------------------------------
Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
-------------------------------------------------------------------
Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
-------------------------------------------------------------------
On the Cost of Knowledge of Mobility in Dynamic Networks:An Information-Theoretic Approach
-------------------------------------------------------------------
Approximation Algorithms for Data Broadcast in Wireless Networks
-------------------------------------------------------------------
Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
-------------------------------------------------------------------
Information Dissemination between Mobile Nodes for Collaborative Context Awareness
-------------------------------------------------------------------
Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
-------------------------------------------------------------------
Secured Trust: A Dynamic Trust Computation Model for Secured Communication in Multi agent Systems
-------------------------------------------------------------------
Online System for Grid Resource Monitoring and Machine Learning-Based Prediction
-------------------------------------------------------------------
Reputation-Based Trust for a Cooperative Agent-Based Backup Protection Scheme
-------------------------------------------------------------------
Privilege Management Infrastructure for Virtual Organizations in Healthcare Grids
-------------------------------------------------------------------
Expanding Service Capacities and Increasing Service Reliabilities for the Grid-Based Utility Computing
-------------------------------------------------------------------
Efficient Genre-Specific Semantic Video Indexing
-------------------------------------------------------------------
Toward P2P-Based Multimedia Sharing in User Generated Contents
-------------------------------------------------------------------
Multiple Description of Coded Video for Path Diversity Streaming Adaptation
-------------------------------------------------------------------
Video Streaming Distribution in VANETs
-------------------------------------------------------------------
A Survey on Visual Content-Based Video Indexing and Retrieval
-------------------------------------------------------------------
Concept-Driven Multi-Modality Fusion for Video Search
-------------------------------------------------------------------
Dynamic Resource Allocation for Parallel Data Processing
in the Cloud
-------------------------------------------------------------------
Dynamic Search Algorithm In Unstructured P2P Networks
-------------------------------------------------------------------
Client-Server Communication Using Multi-Tasking Sockets.
-------------------------------------------------------------------
On-Line Data Transmission Based On Realistic Topologies.
-------------------------------------------------------------------
Efficient Data Transfer Using TCP/IP.
-------------------------------------------------------------------
Analyzing The TCP/IP Performance In Mix Networks
-------------------------------------------------------------------
Enterprise Hazard Management
-------------------------------------------------------------------
SMS Hiding Using Graphical Password
-------------------------------------------------------------------
Personal Expense tracker in android mobile
-------------------------------------------------------------------
GPS based location tracking in cell phone
-------------------------------------------------------------------
Mobile Payment using PayPal and Android
-------------------------------------------------------------------
Discriminating DDOS Attacks From Flash Crowds Using Flow Correlation Coefficient
-------------------------------------------------------------------
Precise, Scalable, And Online Request Tracing For Multitier Services Of Black Boxes
-------------------------------------------------------------------
Balancing The Trade-Offs Between Query Delay And Data between data Availability In Manets
-------------------------------------------------------------------


Self-protection in a clustered distributed system
-------------------------------------------------------------------
Android based remote e-learning & laboratory parameters
-------------------------------------------------------------------
Improving security & performance in the TOR network
-------------------------------------------------------------------
Hop-by-Hop routing wireless mesh network with bandwidth guarantees
-------------------------------------------------------------------
Decentralised OOS aware check pointing
-------------------------------------------------------------------
Mobile based secured file storage file storage & retrieval system
-------------------------------------------------------------------
 -------------------------------------------------------------------
Reputation based resource allocation in P2P systems of rational users
-------------------------------------------------------------------
Identification & removal of malicious source of DDOS attack
-------------------------------------------------------------------
Efficient server provisioning with control for end to end
-------------------------------------------------------------------
Reduce defending your data from sequential background knowledge attack
-------------------------------------------------------------------
An advanced hybrid peer to peer bot net
-------------------------------------------------------------------
A machine learning approach identifying disease treatment relations in short texts
-------------------------------------------------------------------
Optimal service pricing for a cloud cache
-------------------------------------------------------------------
Adaptive selective verification: an efficient adaptive counter measure to thwart dos attacks
-------------------------------------------------------------------
Implementing efficient geography multicast protocol in MANET
-------------------------------------------------------------------
Provisioning of deadline-driven request with flexible transmission rate in WDM mesh network
-------------------------------------------------------------------
Normality mining: privacy implication of behavioral profiles
-------------------------------------------------------------------
Data integrity and security system using encryption
Catching packet droppers and modifier in wireless sensor networks

-------------------------------------------------------------------
Cut detection in wireless sensor networks
-------------------------------------------------------------------
A personalised ontology model for web information gathering
-------------------------------------------------------------------
Record matching over query results from multiple web database
-------------------------------------------------------------------
Dynamic load balancing with distribution of virtual server
-------------------------------------------------------------------
Secret-fragment-visible mosaic image a new computer art & its application
-------------------------------------------------------------------
Cloud computing
-------------------------------------------------------------------
Multi-level intrusion detection SXS and log mgmt in cloud computing
-------------------------------------------------------------------
Secret-fragment-visible mosaic image a
Approximation algorithms for data broadcast in wireless networks

-------------------------------------------------------------------
Partial iris recognition using hamming  distance & wireless network
-------------------------------------------------------------------
Modeling and detection of distributed clone attacks for safety transaction
-------------------------------------------------------------------
Automatic discovery of personal name analysis from the web
-------------------------------------------------------------------
A model for data reduction in uncertain & probabilistic database
-------------------------------------------------------------------
Detection of network traffic using behavioral profile
-------------------------------------------------------------------
A greedy link schedule for wireless network
-------------------------------------------------------------------
Android based external file storage secured chunking system in cloud server
-------------------------------------------------------------------
Mitigating routing misbehavior in disruption tolerant networks 
-------------------------------------------------------------------
Identification of malicious node & self reported bandwidth
-------------------------------------------------------------------
Distribution of secret keys &the packets for secured data
-------------------------------------------------------------------
Fuzzy implementation of biometrics with five factor system for secured banking
-------------------------------------------------------------------
Jamming-resistant collaborative broadcast
-------------------------------------------------------------------
Mitigating routing miss behaviour in disruption tolerant networks
-------------------------------------------------------------------
Design & implementation of password management system
-------------------------------------------------------------------
Android based cloud computing(saas)remote network
-------------------------------------------------------------------
HASHBE: hierarchical attribute
-------------------------------------------------------------------
Distributed ,parallel video content delivery with data compression using multi network
-------------------------------------------------------------------
Developing of xml based keyword search with clustered result
-------------------------------------------------------------------
Identification credit card forger system  by location
-------------------------------------------------------------------
Secured online voting system with stenography
-------------------------------------------------------------------
Patterns discovery in sequential database using flame
-------------------------------------------------------------------
Exploiting dynamic resource allocation for efficient parallel data processing in the cloud
-------------------------------------------------------------------
Implementation of smart video surveillance system
-------------------------------------------------------------------
Smartphone-based collaboration and autonomous radio finger
-------------------------------------------------------------------
Grid computing based data secure iaas
-------------------------------------------------------------------
Design of effective counter measures to fight again stealthy attacks
-------------------------------------------------------------------
Mitigating routing misbehavior in disruption tolerant networks 
-------------------------------------------------------------------
In cloud can scientific communities benefit from the economic of scale?
-------------------------------------------------------------------
Virtual energy-based encryption and keying for wireless sensor network
-------------------------------------------------------------------
Adaptive location based content delivery using access point centre deputy and forward mechanism
-------------------------------------------------------------------
Elastic routing table with provable performance for congestion control in DHT network
-------------------------------------------------------------------
PMSE: a personalized mobile search engine
-------------------------------------------------------------------
Cloud agency: a mobile agent based cloud system
-------------------------------------------------------------------
A generic programming approach to record deduplication 
-------------------------------------------------------------------
Capacity of data collection in arbitrary wireless sensor network
-------------------------------------------------------------------
Embedded runtime reconfigurable nodes for wireless sensor
-------------------------------------------------------------------
A game theoretic approach to the formation of clustered network 
-------------------------------------------------------------------
Approaching throughput-optimality in distributed CSMA scheduling algorithm with collisions

-------------------------------------------------------------------
Camouflaging work detection using pokier spectral density and its corresponding spectral flatness-measure
-------------------------------------------------------------------
Personalized email management using network edges
-------------------------------------------------------------------
Adaptive forwarding delay control for VANET data aggregation
-------------------------------------------------------------------
 Dynamic load balancing with distribution of virtual server
-------------------------------------------------------------------
Adaptive opportunistic routing for wireless ad hoc network
-------------------------------------------------------------------
Video streaming distribution in VANET
-------------------------------------------------------------------
Repetition placement for path diversity in tree based routing 
-------------------------------------------------------------------
Robust correlation of encryption attack traffic through stepping stones BX flow water marking
-------------------------------------------------------------------
Leveraging electronic ticketing to provide personalized navigation in PTN
-------------------------------------------------------------------
Centralized probabilistic fielding in structured peer-to-peer networks
-------------------------------------------------------------------
Mechanism design based secure leader election model for instruction detection(MANET)
-------------------------------------------------------------------
Android based remote e-learning and lab parameters monitoring system
-------------------------------------------------------------------
On the use of mobile phones and biometrics
-------------------------------------------------------------------
Optimization or resource provision and cost in cloud computing
-------------------------------------------------------------------
Mining user movement behaviour patterns in a mobile service environment
-------------------------------------------------------------------
 Providing interoperability of e health communities
-------------------------------------------------------------------
 Preserving transparency and accountability in optimistic fair exchange of digital signature
-------------------------------------------------------------------
Novel key management solution for reinforcing compliance
-------------------------------------------------------------------

Implementation of multi cloud computing

-------------------------------------------------------------------
Resisting defense against large scale online password guessing attack
-------------------------------------------------------------------
Efficient and scalable multicast routing protocol in mobile
-------------------------------------------------------------------
Secured IAAS implementation of cloud computing 
-------------------------------------------------------------------
Data leakage detection
-------------------------------------------------------------------
Automatic discovery of personal name analysis from the web

-------------------------------------------------------------------
Mobile based video streaming and home automation system using android phones
-------------------------------------------------------------------
A network coding equivalent content distribution schemes
-------------------------------------------------------------------
Design and identification of dominant congested links to avoid packet loss
-------------------------------------------------------------------
A cloud based intrusion detection and response system for mobile phones
-------------------------------------------------------------------
Tele operation of multiple social robots
-------------------------------------------------------------------
State monitoring in cloud data centers
-------------------------------------------------------------------
Toward p2p based multimedia sharing in user generated contents
-------------------------------------------------------------------
Dynamic resource allocation
-------------------------------------------------------------------
Image based secured password using hashed bytes
-------------------------------------------------------------------
Identification of actual high throughput and secured multicast routing
-------------------------------------------------------------------
A new efficient algorithm for the removal of high density salt
-------------------------------------------------------------------
 Digital image authentication from JPEG headers
-------------------------------------------------------------------
 ICAPTCHA-Next Gen of capthcha designed to defend against third party  human attack
-------------------------------------------------------------------
Bloom cast: efficient and efficient full text retrieval in unstructured p2p networks 
-------------------------------------------------------------------
User-level implementations Of read-copy update
-------------------------------------------------------------------
Measurouting: A Framework For Routing Assisted Traffic Monitoring
-------------------------------------------------------------------
Optimal Construction Of All Shortest Node_Disjoint Paths In Hypercubes
-------------------------------------------------------------------
On Multicopy Opportunistic Forwarding Protocols In Nondeterministic Delay Tolerant Networks
-------------------------------------------------------------------
Ccd: A Distributed Publish/Subscribe Framework For Rich Content Formats
-------------------------------------------------------------------
Compression Of View On Anonymous Networks
-------------------------------------------------------------------
A Framework For Routing Performance Analysis In Delay Tolerant Networks With Application To Noncooperative Networks
-------------------------------------------------------------------
Receiving Buffer Adaptation For High-Speed Data Transfer
-------------------------------------------------------------------
Self Adaptive Contention Aware Routing Protocol For Intermittently Connected Mobile Networks
----------------------------------------------


Toward Efficient and Simplified Distributed Data Intensive Computing
-------------------------------------------------------------------
Measuring Client-Perceived Page view Response Time of Internet Services
-------------------------------------------------------------------
A Distributed Algorithm for the Replica Placement Problem
-------------------------------------------------------------------
Quasi-Kautz Digraphs for Peer-to-Peer Networks
-------------------------------------------------------------------
The Small World of File Sharing
-------------------------------------------------------------------
Generalized probabilistic flooding in unstructured peer-to-peer networks
-------------------------------------------------------------------
Trace back of DDoS Attacks Using Entropy Variations
-------------------------------------------------------------------
On the Cost of Network Inference Mechanisms
-------------------------------------------------------------------
A Probabilistic Scheme For Keyword-Based Incremental Query Construction
-------------------------------------------------------------------
Continuous Top-K Dominating Queries
-------------------------------------------------------------------
A query formulation language For the data web
-------------------------------------------------------------------
A Unified Probabilistic Framework For Name Disambiguation In Digital Library
-------------------------------------------------------------------
Using Rule Ontology In Repeated Rule Acquisition From Similar Web Sites
-------------------------------------------------------------------
Scalable Scheduling Of Updates In Streaming Data Warehouses
-------------------------------------------------------------------
Achieving Data Privacy Through Secrecy Views And Null-Based Virtual Updates
-------------------------------------------------------------------
Multiparty Access Control For Online Social Networks: Model And Mechanisms
-------------------------------------------------------------------
Automatic Discovery of Personal Name Aliases from the Web
-------------------------------------------------------------------
Efficient Keyword-Based Search for Top-K Cells in Text Cube
-------------------------------------------------------------------
SPARK2: Top-k Keyword Query in Relational Databases
-------------------------------------------------------------------
Data mining for XML query- answering support
-------------------------------------------------------------------
On Computing Farthest Dominated Locations
-------------------------------------------------------------------
Performance Modeling And Analysis Of Network Firewalls
-------------------------------------------------------------------
Revisiting Defenses Against Large-Scale Online Password Guessing Attacks
-------------------------------------------------------------------
Mitigating distributed denial of service attacks in multiparty applications In the presence of clock drifts
-------------------------------------------------------------------
M-Score: A Misuseability Weight Measure
-------------------------------------------------------------------
Recommendation Models For Open Authorization
-------------------------------------------------------------------
Improving Security and Efficiency in Attribute-Based Data Sharing
-------------------------------------------------------------------
A New Chaos-Based Crypto system for Secure Transmitted Images
-------------------------------------------------------------------
CASTLE: Continuously Anonymizing Data Streams
-------------------------------------------------------------------
Hasbe: A Hierarchical Attribute- Based Solution For Flexible And Scalable Access Control In Cloud Computing
-------------------------------------------------------------------
Enhanced privacy id: a direct Anonymous attestation scheme with enhanced revocation capabilities
-------------------------------------------------------------------
A Secure Erasure Code-Based Cloud Storage System With
Secure Data Forwarding
-------------------------------------------------------------------
Trustworthy Coordination Of Web Services Atomic Transactions


-------------------------------------------------------------------
Optimization Of Resource Provisioning Cost In Cloud Computing
-------------------------------------------------------------------
EduCloud: PaaS versus IaaS Cloud Usage for an Advanced Computer Science Course
-------------------------------------------------------------------
A Data Throughput Prediction and Optimization Service for Widely DistributedMany-Task Computing
-------------------------------------------------------------------
Optimal service pricing for a cloud cache
-------------------------------------------------------------------
Work Item Tagging: Communicating Concerns In Collaborative Software Development
-------------------------------------------------------------------
Resource Management For Complex, Dynamic Environments
-------------------------------------------------------------------
Exploiting The Essential Assumptions Of Analogy-Based Effort Estimation
-------------------------------------------------------------------
Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
-------------------------------------------------------------------
Removing Boundary Artifacts
For Real-Time Iterated Shrinkage Deconvolution
-------------------------------------------------------------------
Scalable Coding Of Encrypted Images
-------------------------------------------------------------------
Real time artifact-free image up scaling
-------------------------------------------------------------------
Fuzzy Random Impulse Noise Removal From Color Image Sequences

-------------------------------------------------------------------

M44obile Data Offloading through OpportunisticCommunications and Social Participation

-------------------------------------------------------------------


Design of Efficient Multicast Protocol for IEEE 802.11n WLANs and Cross-Layer Optimization for Scalable Video Streaming

-------------------------------------------------------------------


  A Look-Ahead Approach to Secure MultipartyProtocols
-------------------------------------------------------------------

Protecting Location Privacy against Location-Dependent Attacks in Mobile Services 

 -------------------------------------------------------------------

Efficient and Progressive Algorithms for DistributedSkyline Queries over Uncertain Data

 -------------------------------------------------------------------


Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers


 -------------------------------------------------------------------


Mobile video transmission via Wyner-Ziv videocoding and rate compatible modulation


-------------------------------------------------------------------
On Reliable Broadcast In Low Duty-Cycle Wireless Sensor Networks
-------------------------------------------------------------------
Moderated Group Authoring System For Campus-Wide Workgroups
-------------------------------------------------------------------
Smooth Trade-Offs Between Throughput And Delay In Mobile Ad Hoc Networks
-------------------------------------------------------------------
Toward Reliable Data Delivery For Highly Dynamic Mobile Ad Hoc Networks
-------------------------------------------------------------------
Energy-Efficient Strategies for Cooperative Multi-Channel MAC Protocols
-------------------------------------------------------------------
Measurement-awaremonitor placement and routing: a joint optimization approach for Network-wide measurements
-------------------------------------------------------------------
Detecting And Resolving Firewall Policy Anomalies
-------------------------------------------------------------------

Segmentation and Sampling of Moving ObjectTrajectories Based on Representativeness

 -------------------------------------------------------------------

Mining Online Reviews for Predicting Sales Performance: A Case Study in the Movie Domain

 -------------------------------------------------------------------

Outsourced Similarity Search on Metric Data Assets

 -------------------------------------------------------------------

A Discriminative Model of Motion and Cross Ratio forView-Invariant Action Recognition

 -------------------------------------------------------------------


Efficiently Acquiring Communication Traces for Large -Scale Parallel Applications
-------------------------------------------------------------------
Prototype-Based Image Search Reranking
-------------------------------------------------------------------
Privacy Enabled Digital Rights I Management Without Trusted Third Party Assumption
-------------------------------------------------------------------
Aesthetics-Based Stereoscopic Photo Cropping For Heterogeneous Displays
-------------------------------------------------------------------
Tag Tagging: Towards More Descriptive Keywords of Image Content
-------------------------------------------------------------------
A User-Oriented Image Retrieval System Based on Interactive Genetic Algorithm
-------------------------------------------------------------------
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
-------------------------------------------------------------------
Scalable Scheduling of Updates in Streaming Data Warehouses

-------------------------------------------------------------------
 Meeting Soft Deadlines in Scientific Workflows Using Resubmission Impact

 -------------------------------------------------------------------

The Boomerang Protocol: Tying Data to Geographic Locations in Mobile Disconnected Networks

 -------------------------------------------------------------------

Detecting and Resolving Firewall Policy Anomalies


-------------------------------------------------------------------
Optimization of Resource Provisioning Cost in Cloud Computing
-------------------------------------------------------------------
Reversible Image Watermarking Using Interpolation Technique
-------------------------------------------------------------------
Policy based resource allocation in IaaS cloud
-------------------------------------------------------------------
Improving job scheduling algorithms in a grid environment
-------------------------------------------------------------------
Aiming at Higher Network Security through Extensive Penetration Tests
-------------------------------------------------------------------
An Analytical Performance Modeling Approach for Supply Chain Networks
-------------------------------------------------------------------
An Effective Data Transformation Approach for Privacy Preserving Similarity Measurement
-------------------------------------------------------------------
Face Feature Weighted Fusion Based on Fuzzy Membership Degree for Video Face Recognition
-------------------------------------------------------------------
Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks
-------------------------------------------------------------------
Traffic Scheduling Technique for Smart Grid Advanced Metering Applications

-------------------------------------------------------------------
HYMN: A Novel Hybrid Multi-Hop Routing Algorithm to Improve the Longevity of WSNs
-------------------------------------------------------------------
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services
-------------------------------------------------------------------
Predictive Encoder and Buffer Control for Statistical Multiplexing of Multimedia Contents-------------------------------------------------------------------
Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks
-------------------------------------------------------------------
An Analytical Performance Modeling Approach for Supply Chain Networks
-------------------------------------------------------------------
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
-------------------------------------------------------------------
An Ontology-Based Text-Mining Method to Cluster Proposals for Research Project Selection
-------------------------------------------------------------------
Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
-------------------------------------------------------------------
Complexity Analysis and Algorithm Design for Advance Bandwidth Scheduling in Dedicated Networks
-------------------------------------------------------------------
Traffic monitoring in transmission control protocol/active queue management networks through a time-delay observer.
-------------------------------------------------------------------
Maintaining Data Consistency in Structured P2P Systems
-------------------------------------------------------------------
Eliminating Duplicate Forwarding in Wireless Opportunistic Routing
-------------------------------------------------------------------
Network-Wide Local Unambiguous Failure Localization (NWL-UFL) via Monitoring Trails
-------------------------------------------------------------------
Digital Pathology: Data-Intensive Frontier in Medical Imaging
-------------------------------------------------------------------
Quality-of-service-enabled ant colony- routing for mobile ad hoc networks
-------------------------------------------------------------------
Analytical Approach for the Power Management of Blended-Mode Plug-In Hybrid Electric Vehicles
-------------------------------------------------------------------
High-Speed Quantum Key Distribution System for 1-Mbps Real-Time Key Generation
-------------------------------------------------------------------
Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding
-------------------------------------------------------------------
Secure Cooperative Data Storage and Query Processing in Unattended Tiered Sensor Networks
-------------------------------------------------------------------
Scalable Feedback Aggregating (SFA) Overlay for Large-Scale P2P Trust Management
-------------------------------------------------------------------
Three-Dimensional Imaging Using Collocated MIMO Radar and ISAR Technique
-------------------------------------------------------------------
Multi-Level Diskless Checkpointing

Energy-Efficient Routing Protocols in Wireless SensorNetworks: A Survey
-------------------------------------------------------------------

Insights on Media Streaming Progress Using BitTorrent-Like Protocols for On-Demand Streaming

-------------------------------------------------------------------


Catching Packet Droppers and Modifiers in WirelessSensor Networks

-------------------------------------------------------------------
Distributed Private Key Generation for Identity Based Cryptosystems in Ad Hoc Networks
-------------------------------------------------------------------
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
-------------------------------------------------------------------
An Efficient Approach for Mobile Asset Tracking Using Contexts
-------------------------------------------------------------------
Enhancing the Trust of Internet Routing With Lightweight Route Attestation
-------------------------------------------------------------------
Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems
-------------------------------------------------------------------
Windowed Decoding of Protograph-Based LDPC Convolutional Codes over Erasure Channels.
-------------------------------------------------------------------
Performance analysis of cloud with queue-dependent virtual machines
-------------------------------------------------------------------

Coordinated Multilevel Buffer Cache Management with Consistent Access Locality Quantification (2007 project)

-------------------------------------------------------------------
How Much to Share: A Repeated Game Model for Peer-to-Peer Streaming under Service Differentiation Incentives
-------------------------------------------------------------------
Bounding the Impact of Unbounded Attacks in Stabilization.
-------------------------------------------------------------------
Balancing the Trade-Offs between Query Delay and Data Availability in MANETs
-------------------------------------------------------------------
Link-Stability and Energy Aware Routing Protocol in Distributed Wireless Networks
-------------------------------------------------------------------
Grouping-Enhanced Resilient Probabilistic En-Route Filtering of Injected False Data in WSNs
-------------------------------------------------------------------
Obtaining Provably Legitimate Internet Topologies
-------------------------------------------------------------------

 -------------------------------------------------------------------

Approximation Algorithms for Data Broadcast in Wireless Networks

 -------------------------------------------------------------------

Directed by Directionality: Benefiting from the GainPattern of Active RFID Badges

 -------------------------------------------------------------------

Distributed α -Optimal User Association and Cell Load Balancing in Wireless Networks.
-------------------------------------------------------------------
Cooperative Profit Sharing in Coalition-Based Resource Allocation in Wireless Networks
------------------------------------------------------------------
MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
-------------------------------------------------------------------
Fast Data Collection in Tree-Based Wireless Sensor Networks.
-------------------------------------------------------------------
Robust Topology Engineering in Multiradio Multichannel Wireless Networks.
-------------------------------------------------------------------
Local Greedy Approximation for Scheduling in Multihop Wireless Networks.
-------------------------------------------------------------------
Stateless Multicast Protocol for Ad Hoc Networks.
-------------------------------------------------------------------
Measurement-Based Bandwidth Scavenging in Wireless Networks.
-------------------------------------------------------------------
Efficient Rendezvous Algorithms for Mobility-Enabled Wireless Sensor Networks.
-------------------------------------------------------------------
Cut Detection in Wireless Sensor Networks.
-------------------------------------------------------------------

An Online Data Access Prediction and Optimization Approach for Distributed Systems

-------------------------------------------------------------------


 Performance and cost optimization for multiplelarge-scale grid workflow applications(2007 project)

-------------------------------------------------------------------


ES-MPICH2: A Message Passing Interface with Enhanced Security

-------------------------------------------------------------------
Improving End-to-End Routing Performance of Greedy Forwarding in Sensor Networks.
-------------------------------------------------------------------
Performance Analysis of Cloud Computing Centers Using M=G=m=m þ r Queuing Systems
-------------------------------------------------------------------
Modeling and Analysis of Communication Networks in Multi-Cluster Systems under Spatio-Temporal Bursty Traffic.
-------------------------------------------------------------------
Catching Packet Droppers and Modifiers in Wireless Sensor Networks
-------------------------------------------------------------------
Catching Packet Droppers and Modifiers in Wireless Sensor Networks
-------------------------------------------------------------------


Packet-Hiding Methods for Preventing SelectiveJamming Attacks

-------------------------------------------------------------------


New Fault-Based Side-Channel Attack Using FaultSensitivity

-------------------------------------------------------------------
The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
-------------------------------------------------------------------
An Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks
-------------------------------------------------------------------
Independent Directed Acyclic Graphs for Resilient Multipath Routing
-------------------------------------------------------------------
A Greedy Link Scheduler for Wireless Networks with Gaussian Multiple-Access and Broadcast Channels
-------------------------------------------------------------------
Scalable Video Multicast with Adaptive Modulation and Coding in Broadband Wireless Data Systems
-------------------------------------------------------------------
Efficient Error Estimating Coding Feasibility and Applications
-------------------------------------------------------------------
Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols.
-------------------------------------------------------------------
Differentiated Protection of Video Layers to Improve Perceived Quality.
-------------------------------------------------------------------
Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees.
-------------------------------------------------------------------
Link Positions Matter: A Non commutative Routing Metric for Wireless Mesh Networks.
-------------------------------------------------------------------
Efficient and Fair Bandwidth Allocation in Multi-channel Cognitive Radio Networks.
-------------------------------------------------------------------
Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks.
------------------------------------------------------------------- 

Energy-Efficient Cooperative Video Distribution withStatistical QoS Provisions over Wireless Networks
------------------------------------------------------------------- 

 Efficient Virtual Backbone Construction with Routing Cost Constraint in Wireless Networks UsingDirectional Antennas

 -------------------------------------------------------------------

Cheers,
Final Year Project guide